Little brother is watching you

Slides:



Advertisements
Similar presentations
Its more than a game, its your life…. What do you do online?
Advertisements

Northside I.S.D. Acceptable Use Policy
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
When you are ready, click your mouse and we will begin.
Consumer Issues Chapter 28.
Top 10 Mistakes Employers Make and How to Keep from Making Them Ashley Scheer Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas, Texas (214)
S2 – COMMUNICATIONS UNIT
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
1 Freedom of Expression Prepared By Joseph Leung.
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Jeopardy The Sexual Harassment Edition. Definitions Rules, Regulations, Guidelines & Law What Next (or What’s Not Next)? Facts About Sexual Harassment.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
For Students of Humble ISD
Do you know how to keep yourself safe?
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Career Jump Start Class Mr. Work Based Period 4
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Copyright, Designs and Patents Act 1988
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
COMPUTER ETHICS Do you know the difference between right and wrong?
Looking Professional Online: Why Social Media isn’t always your friend …
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
00870B2F.0/Internet%20Safety.jpg.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Business Ethics. What is Ethics? Ethics: A set of moral principles, especially ones relating to or affirming a specified group, field, or form of conduct;
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
DIGITAL CITIZENSHIP PROJECT
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
Squalicum High School Computer Network Student Use Guidelines.
Mrs. Feliciano’s Guide to Understanding Copyright and Fair Use 3rd-6th Grade.
By Tyler Daniels.  Privacy  - Employers monitoring employees every move  - Can get employees fired for doing things they didn’t know were being monitored.
It’s more than a game, it’s your life… What do you do online?
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Bell Ringer Activity A neighbor offered you $15 for picking up her mail. Afterward, she gives you $20 and refuses change. She actually gave you two twenties.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Counterarguments & Responses UNIV 112 Fall A part of argument Counterarguments answer the question: What significant questions or positions different.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Hiring and Social Networks Zach Dingmann Jess Hogan Laura Kerkaert.
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
Facing Facebook: The Reality of Life in a Virtual World Maria Mancusi, Janine Bowen, Courtney Dillon, Nelly Zorilla.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Bullying Stopping the virus. By the end of the lesson you will… Know –…what cyberbullying is Understand –…what impact it can have –…why the ‘two Cs’ are.
 Being free from public attention that means not being watched or disturbed by other people.
Solutions of Case Study 4 & 6
IT Monitoring in the Workplace
To Know what Cyber crime is
To spy or not to spy; that is the question
Being CyberSmart! About Online Safety and Security At Schools
Internet Safety & Acceptable Use Standards
LAUSD Responsible Use Policy (RUP)
Internet law Business law.
COMPUTER ETHICS: Gender Effects and Employee Internet Misuse
Ethics & Privacy CSCI 101.
Presentation transcript:

Little brother is watching you The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton

The issue A software package, called Little Brother, that uses a database of 45,000 web sites, is allowing employers to monitor their employee’s internet usage. The software categorizes software as productive, nonproductive or neutral and then will provide the employers ratings for their employees based on web sites visited throughout the workday. The software also includes programs to block objectionable web sites, remotely enter employee hard drives, read their email, and find deleted emails.

The law According to the 1986 Electronic Communications Privacy Act, it is illegal for unauthorized individuals to look at someone else’s email, but the Act exempts service providers from these provisions. This is commonly interpreted to include employers who provide e-mail and Net access. According to Santa Clara University Professor of Law Dorothy Glancy. "Often, court opinions take the point of view that when the employees are using employers' property—the employers' computers and networks—the employees' expectation of privacy is minimal.”

The law The article gave an example where a man was fired for inappropriate emails to his supervisor about management. He claimed his rights were violated because the company promised him his emails were private. However, the courts ruled in the company’s favor, saying “The company's interest in preventing inappropriate and unprofessional conduct outweighed the man’s privacy rights.”

Case for workplace monitoring One benefit that few people can argue with is that employers can use the software to find and delete games that employees have downloaded or installed. One probably can not find issue with employers expecting computers they provide for work to be used for work. So, the big question is, why is it then a big deal that employers look through employee internet browsing history to see if they are spending their time on work- related activities? The article defined this browsing “cyberlollygagging” and stated “A study by Nielsen Media Research found that employees at major corporations such as IBM, Apple, and AT&T logged onto the online edition of Penthouse thousands of times a month.”

Case for workplace monitoring On top of looking at non- work related materials, employers also have to worry about employees using email to steal key information from them. The article cited a man who was caught emailing his personal email account $5 million bytes of company source code on company products. It was found out he was doing this to bring it to a rival company of which he was leaving to go work for! Lastly, employers have to worry about being sued for inappropriate work atmospheres due to inappropriate emails. This includes sexual or racial jokes and pornographic material that may forwarded to other employees in the business.

Case against workplace monitoring An employee writes a note to her boyfriend. She puts it in an envelope, affixes her own stamp, and drops it in the basket where outgoing mail is collected. Does the fact that the pencil and paper she used belong to her employer give her boss the right to open and read this letter? Is this so different than the employer looking into this employee’s email to her boyfriend just because they own the computer?

Case against workplace monitoring Most would argue that as long as their internet usage does not interfere with the job they are being paid for, what’s the big deal? Others claim the time management spends monitoring employee usage is just as much a waste of time as their time on non- work related websites! Also, while employee computers are being monitored, who is monitoring management’s computers?

Can there be common ground? In order to avoid anger, confusion, and a feeling of privacy invasion, employers have to be honest up front, especially contractually, about how much “computer privacy” employees will actually have. If employees are not OK with companies being able to look at their emails and web surfing history, and are told up front that it will be happening, they can go elsewhere to work. A recent survey of employees at various businesses showed that most employees heard about their e-mail policy by word of mouth or were involved in the writing of the policy.

My opinion I personally have no problem with companies looking at my internet browsing history, as long as they keep the big picture in mind. If I am looking at pornography, then yes, I deserve to have consequences. However, if it is shown that I have spent time on ESPN.com, and my work is getting done, then who cares!

My opinion Companies really need to take a look at worker productivity in terms of the work that is assigned to employees. If they see someone is getting their job done but has spent hours on non- work related sites, then give them more work to do, not fire them! Don’t think management should be allowed to look at their employees’ email unless it is needed in some sort of legal issue.

Article Miriam Schulman, Santa Clara University http://www.scu.edu/ethics/publications/iie/v9n2/brother.html